-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/aws_eks_identity_provider_config - Adds a new resource for EKS OIDC Identity Provider Config #17959
r/aws_eks_identity_provider_config - Adds a new resource for EKS OIDC Identity Provider Config #17959
Conversation
Thank you for your contribution! 🚀 Please note that typically Go dependency changes are handled in this repository by dependabot or the maintainers. This is to prevent pull request merge conflicts and further delay reviews of contributions. Remove any changes to the Additional details:
|
4dd062e
to
f8975a2
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @willvrny 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
Is there anything missing on this PR prior to removing the draft flag? I'd be happy to help if necessary, this would be a great feature to have! |
Hi @xabinapal. I was just hoping to get some clarification on my questions above. Aside from any changes from those answers I think functionality wise it's ready. |
5c94338
to
f8ffabc
Compare
Any plan to release this feature soon ? |
@willvrny Thanks for the contribution 🎉 👏.
|
f8ffabc
to
65c612a
Compare
Thank you @ewbankkit. I've made the change to use |
Any plan to merge this feature? It will be great if I can use this feature |
@willvrny Once you remove [WIP] I can start review and get this one merged. |
@ewbankkit Done. Thank you. |
This adds a new resource for associating an identity provider with an EKS cluster. This commit implements only the required fields.
This adds a new resource for associating an identity provider with an EKS cluster. This commit adds a placeholder for the changelog entry and initial documentation for the resource.
This adds a new resource for associating an identity provider with an EKS cluster. This commit adds a the ability to import an existing identity provider config resource.
This adds a new resource for associating an identity provider with an EKS cluster. This commit adds a test for if the resource dissapears and handles an invalid request exception when the identity provider config is not associated to the specified cluster on delete.
This adds a new resource for associating an identity provider with an EKS cluster. This commit adds the optional fields to the resource and tests for them. It also adds tests for the validation on the schema.
This adds a new resource for associating an identity provider with an EKS cluster. This commit fixes the formatting of the terraform code in string templates and fixes the wrong grouping for imports.
This adds a new resource for associating an identity provider with an EKS cluster. This commit fixes the formatting of the terraform code in the docs and the indenting of unordered lists.
This adds a new resource for associating an identity provider with an EKS cluster. This commit renames the changelog entry to the pull request number.
Moving to the new 'expandStringMap' method after pulling updates from upstream main branch.
Adding in the required 'ErrorCheck' to fix the awsproviderlint error. Moving from using the background context to the TODO context in the acceptance tests.
Running a go mod tidy to clean up go.sum.
Fixing the tfproviderdocs linting error around using 'terraform' and not 'hcl' for the markdown code samples.
…tityProviderConfig_AllOidcOptions'.
e3b1c4f
to
518228c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
Commercial
% make testacc TEST=./aws TESTARGS='-run=TestAccAWSEksIdentityProviderConfig_'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSEksIdentityProviderConfig_ -timeout 180m
=== RUN TestAccAWSEksIdentityProviderConfig_basic
=== PAUSE TestAccAWSEksIdentityProviderConfig_basic
=== RUN TestAccAWSEksIdentityProviderConfig_disappears
=== PAUSE TestAccAWSEksIdentityProviderConfig_disappears
=== RUN TestAccAWSEksIdentityProviderConfig_AllOidcOptions
=== PAUSE TestAccAWSEksIdentityProviderConfig_AllOidcOptions
=== RUN TestAccAWSEksIdentityProviderConfig_Tags
=== PAUSE TestAccAWSEksIdentityProviderConfig_Tags
=== CONT TestAccAWSEksIdentityProviderConfig_basic
=== CONT TestAccAWSEksIdentityProviderConfig_Tags
=== CONT TestAccAWSEksIdentityProviderConfig_AllOidcOptions
=== CONT TestAccAWSEksIdentityProviderConfig_disappears
--- PASS: TestAccAWSEksIdentityProviderConfig_AllOidcOptions (2208.99s)
--- PASS: TestAccAWSEksIdentityProviderConfig_disappears (2226.30s)
--- PASS: TestAccAWSEksIdentityProviderConfig_basic (2226.77s)
=== CONT TestAccAWSEksIdentityProviderConfig_Tags
--- PASS: TestAccAWSEksIdentityProviderConfig_Tags (2320.02s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 2323.155s
GovCloud
% make testacc TEST=./aws TESTARGS='-run=TestAccAWSEksIdentityProviderConfig_'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSEksIdentityProviderConfig_ -timeout 180m
=== RUN TestAccAWSEksIdentityProviderConfig_basic
=== PAUSE TestAccAWSEksIdentityProviderConfig_basic
=== RUN TestAccAWSEksIdentityProviderConfig_disappears
=== PAUSE TestAccAWSEksIdentityProviderConfig_disappears
=== RUN TestAccAWSEksIdentityProviderConfig_AllOidcOptions
=== PAUSE TestAccAWSEksIdentityProviderConfig_AllOidcOptions
=== RUN TestAccAWSEksIdentityProviderConfig_Tags
=== PAUSE TestAccAWSEksIdentityProviderConfig_Tags
=== CONT TestAccAWSEksIdentityProviderConfig_basic
=== CONT TestAccAWSEksIdentityProviderConfig_Tags
=== CONT TestAccAWSEksIdentityProviderConfig_disappears
=== CONT TestAccAWSEksIdentityProviderConfig_AllOidcOptions
--- PASS: TestAccAWSEksIdentityProviderConfig_basic (2123.50s)
--- PASS: TestAccAWSEksIdentityProviderConfig_disappears (2169.43s)
--- PASS: TestAccAWSEksIdentityProviderConfig_AllOidcOptions (2259.97s)
--- PASS: TestAccAWSEksIdentityProviderConfig_Tags (2292.37s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 2295.438s
@willvrny Thanks for the contribution 🎉 👏.
|
Ah thank you. |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Closes #17607
Output from acceptance testing:
Questions:
3832.718s
. Is this okay or would you prefer a single test per attribute? I think the length is due to spinning up an EKS cluster and then I imagine the identity provider config requires rolling the master nodes.funcs
that allow for passing in a context e.g. CreateContext to avoid using deprecated code. In the tests I've just usedcontext.Background()
. I haven't written too much Go so I'm not too sure if this is correct?